BlueTutorhttp://bluetutor.com
Keeping Technology SimpleFri, 01 Feb 2019 18:13:02 +0000en-UShourly1https://wordpress.org/?v=4.2.23Do You Have a Password Strategy?http://bluetutor.com/password-strategy/
http://bluetutor.com/password-strategy/#commentsFri, 26 Oct 2018 22:15:25 +0000http://bluetutor.com/?p=3654One of the most common ways that hackers break into computers and mobile devices is by obtaining passwords. Although, I realize that it is easy to have one password for all your sites, this approach significantly increases your risk of identity theft.

Here is my 10 top list of simple password rules:

10 – Do not share your passwords

9 – Avoid using birthdays, family names, addresses, or any other obvious personal information

8 – Include letters (at least one capitalized), numbers, and symbols

7 – Do not use the same password for your e-mail and web based accounts

6 – Do not reuse the same password for all your accounts

5 – Change your passwords every 6 months or as soon as you suspect any unauthorized activities on any of your accounts

4 – Do not respond to ANY requests (e-mails or text messages) for personal information

3 – Do not enter password information at any free wi-fi locations such as coffee shops, public parks, hotels, airports, etc.

2- Always log off when you leave your computer or device, and if you are using anyone else’s equipment

And my number one recommendation:

1 – DO NOT KEEP A LIST OF YOUR PASSWORDS ON YOUR COMPUTER OR MOBILE DEVICE

Some of you may already be using one of the many online password managers. However, the important point is that you have a strategy that you are comfortable with that reduces the risk of being hacked and a victim of identity fraud.

]]>http://bluetutor.com/password-strategy/feed/0Are You Being Overwhelmed by Spam Phone Calls and Text Messages?http://bluetutor.com/spam-phone-and-texts/
http://bluetutor.com/spam-phone-and-texts/#commentsFri, 07 Sep 2018 15:16:03 +0000http://bluetutor.com/?p=3649Unwanted calls and spam texts are annoying, but you can do something about them. The New York Times has reported that there are steps you can take to block and report spam calls and texts. Here are some basic recommendations.

– Block and report individual numbers.

– Don’t dial any numbers in an automated menu, don’t reply to any text messages with “STOP,” don’t even talk.

Myth #4: Turning off settings like Bluetooth and Wi-Fi will always save your battery life

Apple offers many suggestions for each of your Apple devices on how to increase your battery life. Click here to read the Apple post.

]]>http://bluetutor.com/iiphone-battery-life/feed/0How to Review and Delete Your Alexa Historyhttp://bluetutor.com/how-to-review-and-delete-your-alexa-history/
http://bluetutor.com/how-to-review-and-delete-your-alexa-history/#commentsSun, 12 Aug 2018 17:47:44 +0000http://bluetutor.com/?p=3640Alexa records everything you say and stores it all in the Alexa app.

Want to review what you’ve asked Alexa (and maybe delete some of the more embarrassing inquiries)? Here’s how.

Click here to read the complete article and the steps you can take to delete your Alexa commands.

]]>http://bluetutor.com/how-to-review-and-delete-your-alexa-history/feed/0How to Minimize the Risk of Identity Thefthttp://bluetutor.com/identity-theft/
http://bluetutor.com/identity-theft/#commentsWed, 10 Jan 2018 23:39:53 +0000http://bluetutor.com/?p=3615What are the most causes of Identity Theft?

While it is impossible to totally eliminate the risk of identity theft, here are some helpful tips on how to minimize the risk.

What about the Equifax Data Breach?

Call each of the three major credit companies and freeze your credit file.

Equifax 800 685-1111 Experian 888 397-3742 TransUnion 888-909-8872

Income Tax Fraud

Do not send your social security number by text message or e-mail. Respond to IRS requests received by mail only. File early. Send all tax reports and checks by certified mail.

Shopping

Use only credit cards when shopping. Credit card charges can be challenged. Do not use debit cards. On the Internet, make sure that the site begins with https. Do not store credit card information with retailers. Remember the data breaches with well known retailers such as Target.

Traveling

Beware of free public wi-fi networks in hotels, coffee shops, airports, public parks, etc. Do not access sensitive sites such as your bank, financial institutions, and online purchasing sites requiring password information. I use a private internet access service which provides the privacy you need in these public places. CLICK HERE to read more about VPN services.

Protect Your Computer

Update all anti-virus and malware programs. Download and install program updates as requested. Ignore phone call warnings about your computers. Hang up immediately. Delete popups warnings about viruses from unknown sources. Delete e-mails from banks and shopping sites asking to update personal info. Never respond to any requests for personal information over the Internet. To learn more about “phishing,” CLICK HERE. I would avoid requests such as “please rate my site or performance and winning a trip.”

Mobile Phones.

Password protect your phone. Do not include lists of personal information or passwords on your mobile phone. Do not download mobile apps from unknown sources or third parties.

Do Not Call Registry

The Do Not Call Registry accepts registrations from both cell phones and land lines. To register by telephone, call 1-888-382-1222. You must call from the phone number that you want to register. To register online (donotcall.gov), you will have to respond to a confirmation email.

What to do if you are a victim of Identity Theft

Call your bank and cancel your ATM/debit card

Call your credit card companies and report your card has been stolen

Report your missing driver’s license to your local DMV and get a new one

File a police report

Call the three credit reporting agencies (Experian, Equifax, Transunion) and have a fraud alert placed on your account

Debt collectors – Tell them you are a victim and provide them with documentation

Tax time is almost upon us, and each year, I rebroadcast an interview I conducted on my radio show with Steve Weisman, a lawyer, college professor, author and one of the country’s leading experts in cybersecurity, identity theft and scams. His website, www.scamicide.com, is updated daily and is one of the most comprehensive sites in the field of cybersecurity,

Below is a link to my interview with Steve on the subject of income tax fraud.

Have you recently left corporate life either by choice or the result of downsizing?

Do you have the right tools for your job search?

Do you have the most cost effective system for your home office?

Are you an effective “Road Warrior?” Does your technology support your mobile needs?

Since you no longer have a support desk, do you have someone to help you with maintenance issues?

What about security issues, backup, and a disaster plan?

Setting up a Home Office

Equipment selection

Software

Services

Maintenance and security

On the Road – Mobile Needs

Laptops

Internet access

Smartphones and tablets

Minimizing communication costs

Online services (cloud computing)

Maintenance and security

Need help making the right decisions regarding your tech requirements for home and on the road? Contact me either by phone 917 921-4518 or by e-mail at jblue@bluetutor.com for a free consultation.

]]>http://bluetutor.com/have-you-recently-left-corporate-life/feed/0Do You Need Help With Tech?http://bluetutor.com/seniors-and-tech/
http://bluetutor.com/seniors-and-tech/#commentsThu, 10 Aug 2017 14:39:43 +0000http://bluetutor.com/?p=3597The Wall Street Journal reports that seniors are relying too heavily on their children to solve their technology problems. “Older adults are wising up to how iPads, smartphones and fitness trackers can improve their lives. But a key to conquering fears and thriving with new technology is knowing where to get help that won’t run out of patience.”

Writes Geoffrey A. Fowler, “Click what?” “Plug where?” Asking your offspring for tech support is… just asking for it. Their responses, often accompanied by an eye roll: “Why is that so hard?” or “I already showed you!”

If you need tech support , find help from people who are technically sound and most important, patient.

]]>http://bluetutor.com/seniors-and-tech/feed/0Why You Need a VPN (Virtual Private Network)http://bluetutor.com/why-you-need-a-vpn-virtual-private-network/
http://bluetutor.com/why-you-need-a-vpn-virtual-private-network/#commentsTue, 13 Jun 2017 16:05:40 +0000http://bluetutor.com/?p=3591Your internet connection may not be as safe as you’d like to think. If you’re connected to a public Wi-Fi network (coffee shops like Starbucks, hotels, airports, public parks, etc.), it’s possible that another person on the same network could be sneaking a look at your internet traffic.

Your iPhone or Android mobile device can’t protect your data as it travels the internet. Using a VPN keeps your information safe and private, even when you’re connected through an insecure Wi-Fi hotspot.

A Virtual Private Network (VPN) is a network technology that creates a secure network connection over a public network such as the Internet.

To read a complete review from PCMag of all the best VPNs for your mobile phones, click HERE.

]]>http://bluetutor.com/why-you-need-a-vpn-virtual-private-network/feed/0What You Need to Know About The New Unlimited Data Planshttp://bluetutor.com/unlimited-data-plans/
http://bluetutor.com/unlimited-data-plans/#commentsMon, 20 Feb 2017 15:50:34 +0000http://bluetutor.com/?p=3576US wireless customers (Verizon. AT&T, Sprint, T-Mobile) have released a range of “unlimited” plan choices. This is the latest in an outgoing price war that has been raging for years.

Before you start evaluating which plan will save you the most money, remember that you must determine which provider offers the best service in your area. Are you frequently getting disconnected in the middle of a call? How is the voice quality of the calls? Quality and Coverage, not price, are the primary factors in picking a cell provider.